This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable...
Kevin Mitnick (code name Condor) is perhaps the most famous hacker of all time. He is an American hacker, IT security consultant, ethical hacking expert, public speaker, and writer. He...
The word hacking comes from the English verb “to hack,” which means “to damage.” Today, with this short article, I will tell you a piece of the history of hacking,...
In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...
Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were. From his early hacks to hacking into prestigious companies while...
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common...
This is the story of Herm1t, founder of VX-Heaven, hacker - currently active in protecting Ukraine from 2014 - and founder of RUH8 in fall 2015, told by means of...
IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management IntroductionThe recent acquisition of BreachForums by IntelBroker marks a significant shift in the landscape of cybercrime. This transition of...
If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of Windows Command Prompt which, in...
Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals, they were pioneers, fueled by an insatiable thirst for knowledge. ...